Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 4 |
Computer Software | 4 |
Postsecondary Education | 4 |
Databases | 3 |
Information Security | 3 |
Information Systems | 3 |
Internet | 3 |
Certification | 2 |
Computer Science Education | 2 |
Educational Attainment | 2 |
Individual Characteristics | 2 |
More ▼ |
Author
Cummings, Jeff | 2 |
Janicki, Thomas | 2 |
Capo, Berta | 1 |
Karp, Jason | 1 |
Matthews, Kevin | 1 |
McDermott, Maureen | 1 |
Mendez, Gabriela | 1 |
Reeves, Jennifer | 1 |
Willemssen, Joel C. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 2 |
Legal/Legislative/Regulatory… | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Willemssen, Joel C. – 1999
This document provides testimony on the U.S. Department of Education's efforts to ensure that its computer systems supporting critical student financial aid activities will be able to process information reliably through the turn of the century. After providing some background information, the statement recaps prior findings and the actions that…
Descriptors: Computer Security, Computer Software, Computer System Design, Federal Government